Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/01/2025, 01:52 UTC

General

  • Target

    JaffaCakes118_61f074dc6d789f6b6ebdf6a9b4e2cad1.exe

  • Size

    201KB

  • MD5

    61f074dc6d789f6b6ebdf6a9b4e2cad1

  • SHA1

    ff09bfbe1775ebb373be90ddfb2636ccf2631f69

  • SHA256

    1bfba64f3c5b4b5f1de406c3f2239c6f8981792ae5e7e5488fe325b24acf9e46

  • SHA512

    f5337eb30dcffd6350bfebeaf09f332ab05030cec64cee943a37668ef4c0319ec61e48e88d64d7d8b295afefd2fbfb23c9b5a9ccf57b2ae463b50fc357639a04

  • SSDEEP

    6144:Hza2Nj+MLxwkcWTq/81DDiSTz9nqEja3TXU0xtF1:HqEjk7l7F1

Malware Config

Signatures

  • Parallax family
  • ParallaxRat

    ParallaxRat is a multipurpose RAT written in MASM.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_61f074dc6d789f6b6ebdf6a9b4e2cad1.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_61f074dc6d789f6b6ebdf6a9b4e2cad1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_61f074dc6d789f6b6ebdf6a9b4e2cad1.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_61f074dc6d789f6b6ebdf6a9b4e2cad1.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2472
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\WWJLG.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2340
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Security" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Security\security.exe" /f
          4⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:1740
      • C:\Users\Admin\AppData\Roaming\Security\security.exe
        "C:\Users\Admin\AppData\Roaming\Security\security.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1592
        • C:\Users\Admin\AppData\Roaming\Security\security.exe
          "C:\Users\Admin\AppData\Roaming\Security\security.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:864
        • C:\Windows\explorer.exe
          "C:\Windows\explorer.exe"
          4⤵
            PID:2088

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\WWJLG.bat

      Filesize

      147B

      MD5

      6f473a1ba53e043362047f72e20b34f4

      SHA1

      e8f121a589e1207ed950453376ee1d21b1223835

      SHA256

      5fbce2c77a90ba9edbcf60be3851ab81633b7c10b1babb624d475c7be589de4b

      SHA512

      b4976d40bc708ae6cddf367a5382cd532e4cf235b848cdaa4e4d317e06d9126e50745a7772591bc21dc7380689f4399e57501b0aa73cd231bce32e22d53b0818

    • \Users\Admin\AppData\Roaming\Security\security.exe

      Filesize

      201KB

      MD5

      81c5ac86bd9fcfed1e5ca65514f2ce28

      SHA1

      7b525f2f518c06a29f79c0365f10cb2a9934ee28

      SHA256

      5b0f481ba9c6a4720ed851c9362c496140512740abdf4f939c29903f36d2bc7b

      SHA512

      5f067dba7df3a095dfdc51cc158503c44213bb76aede1563dbc29d4caa401e89a490b9a3c7b3da7d392177f23fa7522dc7d9adc44df40b526d872d545cabe9e1

    • memory/864-790-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/864-781-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/2376-10-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2376-2-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2376-351-0x0000000000310000-0x0000000000311000-memory.dmp

      Filesize

      4KB

    • memory/2376-4-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2376-20-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/2376-16-0x0000000000250000-0x0000000000251000-memory.dmp

      Filesize

      4KB

    • memory/2472-352-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/2472-786-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/2472-369-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.